لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What allows a security administrator to preview the Security policy rules that match new application signatures?
A. Review Release Notes
B. Dynamic Updates-Review Policies
C. Dynamic Updates-Review App
D. Policy Optimizer-New App Viewer
عرض الإجابة
اجابة صحيحة: A
السؤال #2
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data from the laptop. Which security profile feature could have been used to prevent the communication with the CnC server?
A. Create an anti-spyware profile and enable DNS Sinkhole
B. Create an antivirus profile and enable DNS Sinkhole
C. Create a URL filtering profile and block the DNS Sinkhole category
D. Create a security policy and enable DNS Sinkhole
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Identify the correct order to configure the PAN-OS integrated USER-ID agent. * 3. add the service account to monitor the server(s) * 2. define the address of the servers to be monitored on the firewall * 4. commit the configuration, and verify agent connection status * 1. create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent
A. 2-3-4-1
B. 1-4-3-2
C. 3-1-2-4
D. 1-3-2-4
عرض الإجابة
اجابة صحيحة: A
السؤال #4
An administrator wants to prevent access to media content websites that are risky Which two URL categories should be combined in a custom URL category to accomplish this goal? (Choose two)
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: B
السؤال #5
DRAG DROP Place the steps in the correct packet-processing order of operations.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which interface type can use virtual routers and routing protocols?
A. Tap
B. Layer3
C. Virtual Wire
D. Layer2
عرض الإجابة
اجابة صحيحة: D
السؤال #7
What are three valid information sources that can be used when tagging users to dynamic user groups? (Choose three.)
A. Blometric scanning results from iOS devices
B. Firewall logs
C. Custom API scripts
D. Security Information and Event Management Systems (SIEMS), such as Splun
E. DNS Security service
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What are the requirements for using Palo Alto Networks EDL Hosting Sen/ice?
A. any supported Palo Alto Networks firewall or Prisma Access firewall
B. an additional subscription free of charge
C. a firewall device running with a minimum version of PAN-OS 10
D. an additional paid subscription
عرض الإجابة
اجابة صحيحة: C
السؤال #9
How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?
A. Disable automatic updates during weekdays
B. Automatically “download and install” but with the “disable new applications” option used
C. Automatically “download only” and then install Applications and Threats later, after the administrator approves the update
D. Configure the option for “Threshold”
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Which administrator type provides more granular options to determine what the administrator can view and modify when creating an administrator account?
A. Root
B. Dynamic
C. Role-based
D. Superuser
عرض الإجابة
اجابة صحيحة: A
السؤال #11
You receive notification about new malware that infects hosts through malicious files transferred by FTP. Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?
A. URL Filtering profile applied to inbound Security policy rules
B. Data Filtering profile applied to outbound Security policy rules
C. Antivirus profile applied to inbound Security policy rules
D. Vulnerability Protection profile applied to outbound Security policy rules
عرض الإجابة
اجابة صحيحة: B
السؤال #12
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured? A) B) C) D)
A. Option A
B. Option B
C. Option C
D. Option D
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Based on the security policy rules shown, ssh will be allowed on which port? any port
A.
B. same port as ssl and snmpv3
C. the default port
D. only ephemeral ports
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Which path in PAN-OS 10.0 displays the list of port-based security policy rules?
A. Policies> Security> Rule Usage> No App Specified
B. Policies> Security> Rule Usage> Port only specified
C. Policies> Security> Rule Usage> Port-based Rules
D. Policies> Security> Rule Usage> Unused Apps
عرض الإجابة
اجابة صحيحة: A
السؤال #15
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?
A. Create an LDAP Server profile to connect to the root domain of the Global Catalog server on port 3268 or 3269 for SSL
B. Configure a frequency schedule to clear group mapping cache
C. Configure a Primary Employee ID number for user-based Security policies
D. Create a RADIUS Server profile to connect to the domain controllers using LDAPS on port 636 or 389
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Selecting the option to revert firewall changes will replace what settings?
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: B
السؤال #17
What must be configured before setting up Credential Phishing Prevention?
A. Anti Phishing Block Page
B. Threat Prevention
C. Anti Phishing profiles
D. User-ID
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which definition describes the guiding principle of the zero-trust architecture?
A. never trust, never connect
B. always connect and verify
C. never trust, always verify
D. trust, but verity
عرض الإجابة
اجابة صحيحة: BCE
السؤال #19
The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop the malware contacted a known command- and-control server which exfiltrating corporate data. Which Security profile feature could have been used to prevent the communications with the command-and-control server?
A. Create a Data Filtering Profile and enable its DNS sinkhole feature
B. Create an Antivirus Profile and enable its DNS sinkhole feature
C. Create an Anti-Spyware Profile and enable its DNS sinkhole feature
D. Create a URL Filtering Profile and block the DNS sinkhole URL category
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
A. Management
B. High Availability
C. Aggregate
D. Aggregation
عرض الإجابة
اجابة صحيحة: D
السؤال #21
Which DNS Query action is recommended for traffic that is allowed by Security policy and matches Palo Alto Networks Content DNS Signatures?
A. block
B. sinkhole
C. alert
D. allow
عرض الإجابة
اجابة صحيحة: BC
السؤال #22
Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: